Risk
6/14/2010
11:53 PM
50%
50%

Ipswitch Acquires MessageWay In Merger Of Managed File Transfer Vendors

Acquisition will pave the way for more secure application-to-application communications, partners say

Ipswitch, a maker of secure, managed file transfer products and services, on Tuesday will announce it has acquired MessageWay Solutions, a provider of managed file transfer and business integration solutions.

Terms of the deal were not disclosed.

With the addition of MessageWay to its product family, Ipswitch will provide a wide range of secure file transfer services and capabilities, including of advanced analytics, enterprisewide monitoring, and high-performance data translation and transformation for EDI, ERP, and a variety of other message formats, the companies said.

"When people in the industry talk about security, one of the things that they don't often mention is that about 80 percent of the exchanges that go on between companies are exchanges of files between applications, not between people sitting at a desk typing at a computer," says Greg Faubert, president of MessageWay. "This is an area that's becoming more important all the time."

"The file transfer market is changing, not only in the volume and size of messages, but in the way they are handled," says Gary Shottes, president of Ipswitch. "The worlds of managed file transfer, EDI, and middleware, which have typically been handled by different vendors, are converging. We think we'll be in a position to take market share away from all of those more focused players, by offering solutions that provide a more integrated approach." The need for managed file transfer is increasing as organizations look for ways to meet industry and regulatory requirements, such as SOX, PCI, FISMA, and HIPAA, the executives said. Many enterprises need a better way to show a "chain of custody" on file transfers, proving to auditors that data is safe as it travels between partners.

"What we offer is the ability to exchange files securely through the DMZ without the file ever landing on disk," Faubert says. "Companies can submit files or retrieve files through an open protocol, but without the file ever residing in the red zone.

"Once the data gets to its destination, it's encrypted and housed in a secure database," Faubert explains. "The only way for an attacker to get into those files would be for them to have access to the physical disk, all of the encryption keys, and a copy of our software."

Ipswitch expects its combined offerings to get traction in industries where secure file transfer is required, such as financial services, government, and healthcare.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-6093
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.0.x before 7.0.0.2 CF29, 8.0.x through 8.0.0.1 CF14, and 8.5.x before 8.5.0 CF02 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-6196
Published: 2014-11-25
Cross-site scripting (XSS) vulnerability in IBM Web Experience Factory (WEF) 6.1.5 through 8.5.0.1, as used in WebSphere Dashboard Framework (WDF) and Lotus Widget Factory (LWF), allows remote attackers to inject arbitrary web script or HTML by leveraging a Dojo builder error in an unspecified WebSp...

CVE-2014-7247
Published: 2014-11-25
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?